2021
DOI: 10.1007/s12652-020-02744-y
|View full text |Cite
|
Sign up to set email alerts
|

Low rate DDoS mitigation using real-time multi threshold traffic monitoring system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 35 publications
(18 citation statements)
references
References 11 publications
0
9
0
Order By: Relevance
“…Suppose if an attacker disables the ECG (electrocardiogram) sensor of a heart disease patient; this would lead the patient into critical situation or even death [38]. The WBAN literature has suggested various ways to cope up with DoS attack [43][44][45][46][47][48]. Localization service finds the location of biosensors in a dynamic network.…”
Section: Network Communication Security Requirementsmentioning
confidence: 99%
“…Suppose if an attacker disables the ECG (electrocardiogram) sensor of a heart disease patient; this would lead the patient into critical situation or even death [38]. The WBAN literature has suggested various ways to cope up with DoS attack [43][44][45][46][47][48]. Localization service finds the location of biosensors in a dynamic network.…”
Section: Network Communication Security Requirementsmentioning
confidence: 99%
“…To manage the state of uneven system, [15] assumed that the lopsided networks eigenvectors values were not symmetrical, so the conditions were somewhat extraordinary and conceptualized alpha centrality approach. Google's Page Rank [16], among others, is an instance of alpha centrality.…”
Section: Existing Centrality Measuresmentioning
confidence: 99%
“…e total simulation time is 60 seconds. LDDoS attacks usually use the UDP protocol with constant bit rate (CBR) traffic to take a lot of bandwidth, so all attackers will generate UDP/CBR packets and start the attack after 2 s. e following three parameter values are used to describe the characteristics of LDDoS attacks [39]:…”
Section: Experimental Designmentioning
confidence: 99%